2018
DOI: 10.2478/popets-2019-0009
|View full text |Cite
|
Sign up to set email alerts
|

PD-DM: An efficient locality-preserving block device mapper with plausible deniability

Abstract: Encryption protects sensitive data from unauthorized access, yet is not sufficient when users are forced to surrender keys under duress. In contrast, plausible deniability enables users to not only encrypt data but also deny its existence when challenged. Most existing plausible deniability work (e.g. the successful and unfortunately now-defunct TrueCrypt) tackles “single snapshot” adversaries, and cannot handle the more realistic scenario of adversaries gaining access to a device at multiple time points. Such… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(20 citation statements)
references
References 16 publications
0
20
0
Order By: Relevance
“…Plausible deniability ultimately aims to enable users to deny the very existence of sensitive information on storage media when confronted by coercive adversaries e.g., border officers in oppressive regimes. This is essential in the fight against increasing censorship and intrusion into personal privacy [7,20] Unfortunately, it is impractical to deploy existing ORAM mechanisms in such systems due to prohibitively-high access latencies deriving from high asymptotic overheads for accessing items and ORAMinherent randomized access patterns. Also, a full ORAM protocol protecting access patterns of all operations in real time may be unnecessary for plausible-deniability.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Plausible deniability ultimately aims to enable users to deny the very existence of sensitive information on storage media when confronted by coercive adversaries e.g., border officers in oppressive regimes. This is essential in the fight against increasing censorship and intrusion into personal privacy [7,20] Unfortunately, it is impractical to deploy existing ORAM mechanisms in such systems due to prohibitively-high access latencies deriving from high asymptotic overheads for accessing items and ORAMinherent randomized access patterns. Also, a full ORAM protocol protecting access patterns of all operations in real time may be unnecessary for plausible-deniability.…”
Section: Introductionmentioning
confidence: 99%
“…For example, HIVE is almost four orders of magnitude slower than HDDs and two orders of magnitude slower than SSDs. The main contributor to this slowdown is the random placement of data meant to break linkability between separate writes [7,24], an important property ensuring that an adversary cannot link a set of writes to each other logically, given multiple snapshots of the media. Random data placement results in dramatically increased disk-seek related latencies.…”
Section: Introductionmentioning
confidence: 99%
“…In practice, protecting against such powerful adversaries is essential due to increasing instances of intrusion by unfriendly powerful nation state adversaries [15,21]. This is sometimes a matter of life and death [23] as documented in numerous cases where information had to be transferred through checkpoints manned by hostile adversaries.…”
mentioning
confidence: 99%
“…To protect against multi-snapshot adversaries, several recent systems [12,14,15,23] have proposed mechanisms that plausibly "explain" all device state changes via public data operations, in effect protecting access patterns to hidden data.…”
mentioning
confidence: 99%
See 1 more Smart Citation